CVE-2018-10697

An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "srvName" is susceptible to this injection. By crafting a packet that contains shell metacharacters, it is possible for an attacker to execute the attack.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:moxa:awk-3121_firmware:1.14:*:*:*:*:*:*:*
cpe:2.3:h:moxa:awk-3121:-:*:*:*:*:*:*:*

History

28 Feb 2023, 19:29

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html - (MISC) http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2019-06-07 20:29

Updated : 2023-12-10 12:59


NVD link : CVE-2018-10697

Mitre link : CVE-2018-10697

CVE.ORG link : CVE-2018-10697


JSON object : View

Products Affected

moxa

  • awk-3121_firmware
  • awk-3121
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')